Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Applied Bayesian Statistics: With R and OpenBUGS Examples (Springer Texts in Statistics)
Applied Bayesian Statistics: With R and OpenBUGS Examples (Springer Texts in Statistics)

This book is based on over a dozen years teaching a Bayesian Statistics course. The material presented here has been used by students of different levels and disciplines, including advanced undergraduates studying Mathematics and Statistics and students in graduate programs  in Statistics, Biostatistics, Engineering, Economics,...

Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Create your own LoRa wireless projects for non-industrial use and gain a strong basic understanding of the LoRa technology, LoRa WAN, and LPWAN. 

You'll start by building your first LoRa wireless channel and then move on to various interesting projects such as setting up networks with a LoRa gateway,
...
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Probability and Information: An Integrated Approach
Probability and Information: An Integrated Approach
Our experience of theworld leads us to conclude that many events are unpredictable and sometimes quite unexpected. These may range from the outcome of seemingly simple games such as tossing a coin and trying to guess whether it will be heads or tails to the sudden collapse of governments or the dramatic fall in prices of shares on the stock market....
Variants of Evolutionary Algorithms for Real-World Applications
Variants of Evolutionary Algorithms for Real-World Applications

Evolutionary Algorithms (EAs) are population-based, stochastic search algorithms that mimic natural evolution. Due to their ability to find excellent solutions for conventionally hard and dynamic problems within acceptable time, EAs have attracted interest from many researchers and practitioners in recent years. This book...

Working With Objects:The Ooram Software Engineering Method
Working With Objects:The Ooram Software Engineering Method
The book describes the principles behind an industrial approach to software production. We claim that the technological basis of industrial software production should be object orientation. A large part of the book is devoted to explaining all the different things you can do with objects; we will also match the different...
Artificial Intelligence for Fashion: How AI is Revolutionizing the Fashion Industry
Artificial Intelligence for Fashion: How AI is Revolutionizing the Fashion Industry
Artificial intelligence (AI) is becoming a part of the way we conduct business in every industry. The fashion industry is no exception. From product discovery to robotic manufacturing, AI has made its way into almost every segment of the fashion value chain.

The goal of this book
...
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)
Intuitionistic Fuzzy Aggregation and Clustering (Studies in Fuzziness and Soft Computing)

The concept of intuitionistic fuzzy set (IFS) was originally introduced by Atanassov (1983) to extend the concept of the traditional fuzzy set. Each element in an IFS is expressed by an ordered pair which is called an intuitionistic fuzzy value (IFV) (or intuitionistic fuzzy number (IFN)), and each IFV is characterized by a membership degree,...

Queueing Networks and Markov Chains : Modeling and Performance Evaluation With Computer Science Applications
Queueing Networks and Markov Chains : Modeling and Performance Evaluation With Computer Science Applications

The first book to address computer performance evaluation from the perspective of queueing theory and Markov chains.

Queueing Networks and Markov Chains provides comprehensive coverage of the theory and application of computer performance evaluation based on queueing networks and Markov chains. Progressing from basic concepts
...

Synthetic Metal Containing Polymers
Synthetic Metal Containing Polymers
The development of the field of synthetic metal-containing polymers - where metal atoms form an integral part of the main chain or side group structure of a polymer - aims to create new materials which combine the processability of organic polymers with the physical or chemical characteristics associated with the metallic element or complex. This...
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Introduction to Logistics Systems Planning and Control (Wiley Interscience Series in Systems and Optimization)
Logistic systems constitute one of the cornerstones in the design and control of production systems and the modelling of supply chains. They are key to a number of industries, and courses teaching logistics systems planning and control are becoming more widespread. Introduction to Logistics Systems Planning and Control is the first book to...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy